Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate approaches of securing XGBoost connections in multinode environment #6927

Closed
exalate-issue-sync bot opened this issue May 11, 2023 · 2 comments

Comments

@exalate-issue-sync
Copy link

Our current XGBoost integration will not work out of the box if the user chooses to enable internode security (encrypted node-to-node connections). In order to make xgboost work in such a setting, the user has to opt out of the secure connections for native xgboost connections. This is because we currently have very little control over how these connections are made and how the data is sent.

The purpose of this task is to investigate how can we include XGBoost connections into our security model.

@exalate-issue-sync
Copy link
Author

karel.nechvile commented: In the advance of increased security requirements, the trend is also followed by XGBoost.
There is an ongoing activity to implement "Federated Learning" within XGBoost code base and its motivation,
goals and design choices are described here: [https://github.com/dmlc/xgboost/issues/7778|https://github.com/dmlc/xgboost/issues/7778|smart-link]
What's important to us (H2O) is that communication between workers and a trusted aggregator is performed in a secured way.

The initial steps were already merged into master branch in the form of a separate plugin
" Initial support for federated learning #7831" ([https://github.com/dmlc/xgboost/pull/7831|https://github.com/dmlc/xgboost/pull/7831)])
There is also related activity to clean up the communication interface (in progress at the time
of this writing), see Common interface for collective communication #8057
([https://github.com/dmlc/xgboost/pull/8057|https://github.com/dmlc/xgboost/pull/8057).]).

From the point of H2O view (considering secured communication), it's probably advisable to upgrade
H2O-xgboost to latest version and be prepared to use/adapt the (secured) communication framework
when it gets available as part of a standard XGBoost release.

@h2o-ops
Copy link
Collaborator

h2o-ops commented May 14, 2023

JIRA Issue Details

Jira Issue: PUBDEV-8834
Assignee: karel.nechvile
Reporter: Michal Kurka
State: Closed
Fix Version: 3.38.0.1
Attachments: N/A
Development PRs: N/A

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant